SonicWall SSL VPN Vulnerabilities Targeted by Akira Ransomware Group
On September 11, 2025, cybersecurity experts reported a significant uptick in cyber intrusions targeting SonicWall devices, particularly those involving the SSL VPN feature. This surge is attributed to ongoing attacks by the Akira ransomware group, which has recently intensified its efforts since July 2025. Rapid7, a cybersecurity firm, detailed how these vulnerabilities are being exploited, specifically noting the involvement of a serious security flaw identified as CVE-2024-40766, which carries a CVSS score of 9.3.
The flaw in question stems from a failure to reset local user passwords during a migration process, enabling threat actors to exploit persisted credentials. SonicWall has confirmed that attackers are increasingly utilizing brute-force tactics to gain unauthorized access. The firm has urged its clients to adopt critical security measures, including enabling Botnet Filtering to counteract known malicious actors and enforcing Account Lockout policies to mitigate the risks associated with credential stuffing attacks.
In its advisory, SonicWall characterized certain configurations within the LDAP SSL VPN Default User Groups as particularly vulnerable if not properly managed. This misconfiguration could serve as an entry point for cybercriminals, further exacerbating the potential for unauthorized access.
The Akira ransomware group, which is believed to be based in a region known for its cybercrime activities, continues to leverage these vulnerabilities to infiltrate enterprises, posing a considerable threat to organizations that rely on SonicWall technologies. The group employs a variety of techniques outlined in the MITRE ATT&CK framework. Initial access techniques, such as brute-force credential guessing and exploiting known vulnerabilities, are paramount in their operational strategy, further underscoring the importance of stringent security measures.
To prevent such attacks, businesses utilizing SonicWall appliances are encouraged to routinely audit their configurations, particularly the setup of VPN services and user accounts. By doing so, organizations can fortify their defenses and reduce their exposure to emerging threats.
As the cyber landscape evolves, it is essential for business owners to remain vigilant and informed about the latest security vulnerabilities and attack vectors. Adopting proactive measures and understanding the tactics employed by adversaries like the Akira group is key to safeguarding sensitive data and maintaining operational integrity.
The ongoing situation serves as a critical reminder of the vulnerabilities that can exist within commonly used technologies and the importance of ongoing risk assessment and management in today’s digital environment. Organizations should take immediate steps to bolster their cybersecurity postures, ensuring they remain resilient against potential ransomware threats.